Intellect-Partners

Categories
Computer Science Electronics

Unlocking the 6G Future: Harnessing the Potential of Reconfigurable Intelligent Surfaces (RIS)

INTRODUCTION

With each successive generation of communication technology, telecommunication’s primary focus undergoes a transformation. The 2G and 3G epochs were primarily centered on human-to-human communication through voice and text. The advent of 4G marked a pivotal shift toward the extensive consumption of data, while the 5G era prioritized connecting the Internet of Things (IoT) and industrial automation systems.

In the forthcoming 6G era, intelligent computation will drive efficiency and improved human experience. While there is still ongoing innovation in 5G, with the introduction of 5G-Advanced standards, companies have already embarked on research for 6G, with plans to make it commercially available by 2030.

CHARACTERISTICS FOR 6G TECHNOLOGY

According to Nokia Bell Labs, six technology areas are expected to characterize 6G networks. These areas move the industry from faster connectivity alone toward intelligent, secure, sensor-rich and highly automated communication systems.

Figure 1: Six key technology areas expected to characterize 6G networks.
Figure 1: Six key technology areas expected to characterize 6G networks.

Artificial intelligence and machine learning – AI/ML techniques, especially deep learning, have rapidly advanced over the last decade and have already been deployed across domains involving image classification and computer vision, ranging from social networks to security. 5G will unleash the true potential of these technologies; with 5G-Advanced, AI/ML will be introduced into many parts of the network, across multiple layers and functions. From beam-forming optimization in the radio layer to scheduling at the cell site with self-optimizing networks, AI/ML can help achieve better performance at lower complexity.

Spectrum bands – Spectrum is a crucial element in providing radio connectivity. Every new mobile generation requires new pioneer spectrum to fully exploit the benefits of a new technology. Refarming existing mobile communication spectrum from legacy technology to the new generation will also become essential. New pioneer spectrum blocks for 6G are expected to include mid-bands of 7-20 GHz for urban outdoor cells enabling higher capacity through extreme MIMO, low bands of 460-694 MHz for extreme coverage, and sub-THz bands for peak data rates exceeding 100 Gbps.

A network that can sense – One of the most notable aspects of 6G would be its ability to sense the environment, people and objects. The network becomes a source of situational information, gathering signals that bounce off objects and determining type, shape, relative location, velocity and perhaps even material properties. This sensing mode can help create a mirror or digital twin of the physical world in combination with other sensing modalities, extending our senses to every point the network touches. Combining this information with AI/ML will provide new insights from the physical world and make the network more cognitive.

Extreme connectivity – The Ultra-Reliable Low-Latency Communication (URLLC) service that began with 5G will be refined and improved in 6G to address extreme connectivity requirements, including sub-millisecond latency. Network reliability could be amplified through simultaneous transmission, multiple wireless hops, device-to-device connections and AI/ML. Enhanced mobility combined with lower latency and improved reliability will support real-time video communications, holographic experiences and digital twin models updated in real time through the deployment of video sensors.

New network architectures – 5G is the first system designed to operate in enterprise and industrial environments, replacing wired connectivity. As demand and strain on the network increase, industries will require more advanced architectures that support greater flexibility and specialization. 5G is introducing service-based architecture in the core and cloud-native deployments that will be extended to parts of the RAN, with networks deployed in heterogeneous cloud environments involving private, public and hybrid clouds. As the core becomes more distributed and higher layers of the RAN become more centralized, there will be opportunities to reduce cost by converging functions. New network and service orchestration solutions exploiting AI/ML advances will result in an unprecedented level of network automation and lower operating costs.

Security and trust – Networks of all types are increasingly becoming targets of cyber-attacks. The dynamic nature of these threats makes sturdy security mechanisms imperative. 6G networks will be designed to protect against threats such as jamming. Privacy issues will also need to be considered when new mixed-reality worlds combine digital representations of real and virtual objects.

RECONFIGURABLE INTELLIGENT SURFACES (RIS)

A Reconfigurable Intelligent Surface (RIS) is a flat panel with small passive elements, approximately in the range of 1 cm2, each capable of independently adjusting the phase and potentially the amplitude of incident electromagnetic waves. Through precise control of these elements, reradiated waves can be directed toward specific directions with the help of an RIS controller. This enables alternative links within a cell and facilitates communication in non-line-of-sight scenarios, supporting extreme connectivity, AI/ML-based signal augmentation, innovative network architecture and optimized bandwidth utilization.

RIS can be fashioned as self-configuring elements within wireless network infrastructure, fine-tuning electromagnetic attributes in response to shifting traffic demands and propagation characteristics. RIS is conceptually appealing and offers practical implementation advantages because it does not require energy-hungry radio-frequency (RF) chains. The absence of RF chains makes RIS an energy-efficient and cost-effective solution compared with massive MIMO technology, which requires an RF chain for each antenna element and therefore increases hardware cost, complexity and power consumption.

Because RIS is highly passive and requires minimal power for operation, it can be an eco-friendly and cost-effective solution deployable on surfaces such as walls, ceilings, billboards and other infrastructure. However, RIS design still requires careful consideration of coverage range, surface size and the number of elements needed.

Figure 2: Representative RIS-assisted network scenarios, including blocked users, UAV communication, mobile edge computing, vehicular networks, NOMA and physical-layer security.
Figure 2: Representative RIS-assisted network scenarios, including blocked users, UAV communication, mobile edge computing, vehicular networks, NOMA and physical-layer security.

Source: IET Communications RIS article, as shown in the source image.

PATENT ACTIVITY AND COMPETITIVE LANDSCAPE

RIS technology is gaining traction among researchers in 5G-Advanced and 6G. After the standardization of 5G in 2019, patenting activity in RIS technology accelerated because RIS promises gains in spectral and energy efficiency without the expense of massive cell densification, while also unlocking numerous future telecommunication use cases.

Figure 3: RIS patent application activity by application year.
Figure 3: RIS patent application activity by application year.

Source note: Patent analysis using Orbit Intelligence; values reconstructed from the provided screenshot.

The patent landscape view indicates that the top owners of IP related to RIS technology include Qualcomm, Huawei and Samsung. Several Chinese universities are also actively researching in this area, and China constitutes a substantial share of the global RIS patent landscape.

Figure 4: Leading RIS IP owners visible in the source landscape view by patent office or publication route.
Figure 4: Leading RIS IP owners visible in the source landscape view by patent office or publication route.

Source note: Patent analysis using Orbit Intelligence; data reconstructed from the provided screenshot.

CONCLUSION

6G is expected to extend mobile networks beyond connectivity by embedding intelligence, sensing, automation, security and extreme performance into the network fabric. RIS is highly aligned with this direction: by shaping the wireless propagation environment itself, RIS can create alternative links, improve non-line-of-sight coverage, reduce energy consumption and support new architectures for dense, intelligent and adaptive wireless systems.

As patenting activity and research investment increase, RIS is likely to remain a key enabling technology in the transition from 5G-Advanced toward commercial 6G systems.

REFERENCES

Categories
Computer Science Electronics

A Hands-on Guide to Wireshark Analysis (Decoding the Digital Stream)

INTRODUCTION

In today’s digital era, the number of network users is rising rapidly, leading to increased demand for network traffic. As traffic grows, monitoring becomes a top priority to ensure smooth and efficient user services. This is especially important and complex in large networks, where traffic monitoring is critical but challenging. Higher traffic also increases the risk of network attacks, which can affect both performance and security.

A successful attack can disrupt the entire network, causing financial and operational losses for organizations and service providers. Breaches also threaten user privacy and can result in data misuse, creating serious risks and potential leaks of confidential information. Packet sniffing is an important tool for network monitoring, enabling administrators to observe network activities and identify weaknesses. This blog analyzes network traffic using the Wireshark tool, a widely used packet sniffer that captures, reports, and analyzes network traffic to help identify and address issues.

WHAT IS PACKET SNIFFING?

Network sniffing, also known as packet sniffing, is a process of scanning the data packets transmitted over a computer network. The packet sniffing process can be done by a special software tool or hardware known as a packet sniffer, also referred to as a network analyzer or a packet analyzer. The packet sniffing is used for various purposes, the data packets comprising different types of traffic sent over a network, such as to capture user authentication traffic, capture chat messages traffic, capture VOIP call traffic, and capture files during transmission over the network.

It is a process to analyze packets transmitted through the TCP/IP protocol that connects devices to a wireless or wired network. The network admin uses packet sniffing for monitoring the network and analyzing the security of the network. It is used to analyze harmful data packet transmission within the network. The packet sniffing works by observing data transmitted or received between the networked computers and devices and the internet.

HOW PACKET SNIFFING IS PERFORMED?

Packet sniffing requires specialized tools that capture network traffic for analysis. These tools, such as Wireshark, allow users to filter and monitor only the required traffic, making analysis easier. Wireshark is an open source, cross-platform, graphical network packet analyzer widely used for troubleshooting network issues, monitoring request and response transmissions, and analyzing network security.

In this blog, experiments focus on capturing website and chat traffic using Wireshark and analyzing the data in detail. Note that the blog does not cover the basic features of Wireshark. The tool captures both request data sent from user devices to servers and response data sent back to user devices.

Figure 1 shows the Wireshark tool that displays multiple interfaces; the user selects the respective interface to capture the packets using a specific interface. Generally, a Wi-Fi interface is used to capture the traffic in a wireless network.

Figure 1: Wireshark Tool interface
Figure 1: Wireshark Tool interface
EXPERIMENTAL SETUP

In this, the two experiments were performed using the Wireshark tool as given below in detail:

The First Experiment is to capture a website page’s traffic when a user logs in to their account. The Wireshark capture tool is running on the computer system; the user is accessing the website on their mobile device. Where the computer system and mobile device are connected within the same LAN network.

The architecture of the experiment setup is given below in Figure 2. In this, the main goal is to analyze and monitor the website when a user logs in to the website. This allows for monitoring the security of a website to identify whether there is password encryption is enabled or not when the user logs in to the website. Further, it is also used to identify whether users’ logins to the website are authentic or not.

Figure 2: First Experimental Setup
Figure 2: First Experimental Setup

The Second Experiment captures the communication traffic between two users. The Wireshark capture tool is running on the computer system; user 1 has mobile device 1, and user 2 has mobile device 2. Both users’ mobile devices are installed with the same communication application, such as chat communication. The mobile device 1, mobile device 2, and computer system are connected within the same LAN network.

The computer system installed with the Wireshark tool captures the traffic of both mobile devices when users communicate with each other. The detailed architecture of the experiment setup is given below in Figure 3. In this, the main goal is to analyze and monitor how the communication is performed between the users, and identify whether there is message encryption between the users.

Figure 3: Second Experimental Setup
Figure 3: Second Experimental Setup
PERFORMING FIRST EXPERIMENT

In the first experiment, the random website login traffic was captured using Wireshark and the captured packets. The user visits the website, login and enters their login ID and password. If the entered login ID and password are incorrect, the website server does not authenticate the user. If the login ID and password are correct, the website server authenticates the user and allows the user to log in to the website, as shown in Figure 4.

Figure 4: User performing a login action
Figure 4: User performing a login action

When the user logs in to the website, the Wireshark tool running in a network captures all the traffic between the source to destination and vice versa. The captured packets are used for monitoring and analyzing for further purposes. Figure 5 shows the Wireshark tool capturing the user login traffic.

Figure 5: Wireshark tool captured the website login traffic
Figure 5: Wireshark tool captured the website login traffic

Figure 5 shows the Wireshark tools capturing the website traffic when the user logs in to the website. Here, the selected packet number 200 was analyzed, and the Wireshark tool captures the source IPv6 address from which the request is transmitted, such as a mobile device. The destination IPv6 address is the address of the destination server, such as a website server, where the request (such as a POST request method) is received from the source mobile device to log in to the website.

HTTP3 is the protocol used to exchange information on the World Wide Web (WWW). The information includes the data transmitted between the mobile device and the server. The information further includes response and request header information, such as request method, User-Agent, Cookies, server information, origin, referrer, etc.

PERFORMING SECOND EXPERIMENT

In the second experiment, the communication between two users, such as chat message traffic, was captured using Wireshark, and the captured packets were analyzed. In this experiment, both users use a chatting application (such as LAN Messenger) installed on their mobile devices. The chat application runs in the local area network where multiple users communicate through messages within the LAN network. The Wireshark tool is installed in a computer system connected to the same LAN network where the two user devices are connected. Figure 6a shows that the user device 1 communicates with the user device 2, and Figure 6b shows that the user device 2 communicates with the user device 1.

Figure 6a (left side) shows that the user device 1 communicates with the user device 2, and Figure 6b (right side) shows that the user device 2 communicates with the user device 1
Figure 6a (left side) shows that the user device 1 communicates with the user device 2, and Figure 6b (right side) shows that the user device 2 communicates with the user device 1

During communication, the traffic is captured for the user device 1 and user device 2 using the Wireshark traffic capture tool installed in a computer connected to the same network. Figure 7 shows the Wireshark tool capturing the traffic for two devices while chatting.

Figure 7: Traffic capture of User Device 1 and User Device 2
Figure 7: Traffic capture of User Device 1 and User Device 2

According to Figure 7, the Wireshark tool captures the messaging data for both the user devices. However, due to end-to-end encryption, the real message is encrypted in Wireshark. The figure shows that the source IP Address 192.168.137.45 is the address of user device 1 that sends the message to user device 2, which is transmitted via destination 216.239.36.223 using TCP protocol.

The source IP Address 192.168.132.22 is the address of user device 2 that sends the message to user device 1, that transmitted via destination 216.239.34.223 using TCP protocol. Deeply analyzing, the Wireshark tool also captures the device-related information, such as XiaomiCommun_45:fa:3e, communication interface such as Ethernet II. It also contains other information, such as detailed frame information, etc.

CONCLUSION

This blog mainly focuses on the experiments that were performed using the Wireshark packet capture tool. It also explains the basics of the Wireshark tool and the analysis of captured packets. It will also be useful in multiple sectors, such as security purposes, patent infringement tasks, reverse engineering tasks, etc. In the future, more experiments can be performed in different scenarios, such as in VoIP calling, using different Wireshark interface, and deep analysis of network packets.

REFERENCES

[1] https://www.academia.edu/109770037/Analysis_of_Network_Traffic_by_Using_Packet_Sniffing_Tool_Wireshark

[2] https://www.spiceworks.com/it-security/network-security/articles/what-is-packet-sniffing/

[3] https://www.varonis.com/blog/how-to-use-wireshark

[4] https://fengweiz.github.io/19fa-cs315/labs/lab1-instruction.pdf

[5] https://www.geeksforgeeks.org/computer-networks/what-is-packet-sniffing/

[6] https://link.springer.com/chapter/10.1007/978-3-031-43140-1_18

[7] https://www.igi-global.com/chapter/the-role-of-wireshark-in-packet-inspection-and-password-sniffing-for-network-security/363029

[8] https://ieeexplore.ieee.org/abstract/document/8319360

Categories
Electronics

Inside the djOS™ Patent-Pending Architecture aka The “Co-Pilot” Revolution

When Mainstream Entertainment Group Inc. announced djOS™ this week, the coverage focused understandably on the novelty of an AI co-pilot designed for live DJ performance. But read past the press release, and what emerges is something worth examining from a different angle entirely: a carefully constructed patent-pending system that checks nearly every box for defensible intellectual property in the AI space.

For IP practitioners and technology investors watching the artificial intelligence landscape, djOS™ offers a useful case study in how to approach patent strategy when your innovation sits at the intersection of machine learning, real-time signal processing, and human-in-the-loop decision architecture.

The Inventive Concept: Where the Claims Will Live

Patent eligibility for AI-related inventions has been contentious territory since the Supreme Court’s Alice Corp. v. CLS Bank decision in 2014 established the two-step framework that continues to govern § 101 analysis. The USPTO’s 2019 Revised Guidance narrowed the abstract idea exception somewhat, but AI and machine learning patents still face meaningful scrutiny particularly when the claimed innovation amounts to little more than “apply machine learning to [field X].”

djOS™ appears to have been architected with this problem in mind. Based on the disclosed technical details, the system’s claims are not built around the general concept of using AI to suggest music. They are built around a specific, closed-loop technical pipeline with several distinct and interconnected components each of which adds concrete specificity to what would otherwise be a broad functional claim.

The patent-pending filings cover what the company describes as five discrete technical innovations working in concert:

Constraint-satisfaction setlist generation. Rather than simple playlist recommendation, the system ingests a DJ’s music library, historical performance data, and client-defined event parameters including must-play and do-not-play constraints, energy curves, and scheduled timing cues to generate an acoustically optimized setlist that satisfies a defined constraint set. When a requested track cannot be resolved to a file in the DJ’s local library, the system automatically substitutes a harmonically and energetically compatible alternative. This isn’t recommendation; it’s constrained optimization with a reconciliation layer. That distinction matters for claims drafting.

Library-reconciled platform-specific export. The resolved setlist doesn’t just exist as an output file it loads directly into the DJ’s existing software with zero manual intervention. The reconciliation between the AI-generated output and the format requirements of the target platform (Serato, Rekordbox, Traktor, VirtualDJ) represents a concrete technical implementation step that separates this from a purely abstract method claim.

Privacy-preserving real-time telemetry. During live performance, a top-down camera and ambient microphone feed a telemetry pipeline that processes dance-floor movement through dense optical flow analysis and isolates crowd audio through deep-learning source separation. Critically and this is relevant both to patent claims and to an increasingly complex regulatory environment around biometric data the system produces an aggregate engagement signal without capturing, storing, or processing any individual biometric data. The privacy-preserving architecture is not just a product differentiator; it is a design choice that limits regulatory exposure under frameworks like Illinois BIPA, the EU AI Act’s provisions on real-time biometric identification, and emerging state-level biometric privacy statutes.

Feasibility-constrained transition repair. When the crowd engagement signal deviates from the expected energy curve, djOS™ surfaces a track suggestion that is not merely harmonically compatible with the current track’s outro it is specifically filtered to tracks whose intro length fits within the remaining playtime of the song currently playing. This feasibility constraint transforms what would otherwise be a general recommendation function into a technically specific decision system with defined input parameters, filtering logic, and output constraints. For § 101 purposes, this kind of specificity is exactly what patent counsel wants to see.

Deviation-weighted preference learning. After each performance, the system computes the gap between what the AI suggested and what the DJ actually played, weights each divergence by the crowd’s measurable reaction, and updates the DJ’s preference model accordingly. This feedback loop combining behavioral deviation data with outcome signals to update a personalized model is the kind of technically specific machine learning implementation that has fared better under § 101 challenges than generic “train a model on user data” claims.

Human-in-the-Loop as a Patent Strategy

One of the more interesting structural choices in djOS™ and one with real implications for both patentability and regulatory positioning is the explicit preservation of human decision-making authority. The system never plays a track autonomously. It surfaces a suggestion. The DJ decides.

This isn’t just a product philosophy. It’s a design choice that has meaningful consequences across multiple legal frameworks.

From a patent perspective, human-in-the-loop architecture can help distinguish a claimed system from prior art that operates autonomously. If existing DJ automation tools generate and execute playlist changes without human confirmation, the djOS™ workflow where AI generates a candidate action and a human operator approves it represents a structurally different claim space. The interaction model itself becomes part of the claim.

From a liability and regulatory perspective, the human-in-the-loop design positions djOS™ favorably under frameworks that assign heightened scrutiny to fully automated decision systems. The EU AI Act, for instance, places different compliance obligations on systems that make autonomous decisions versus systems that provide decision support to human operators. As AI regulation matures globally, software architectures that preserve human control tend to occupy more defensible legal ground.

From a commercial perspective, this design choice addresses one of the most common objections to AI tools in creative industries: the fear of displacement. djOS™ doesn’t threaten to replace the DJ. It makes the argument and encodes it into the system architecture that the DJ’s judgment is the irreplaceable variable. That’s a meaningful position to take in a market where the audience for the product includes people who have built careers on the value of that judgment.

The Prior Art Landscape

Any analysis of djOS™’s patent prospects has to engage with the existing prior art landscape in music recommendation and DJ technology. This is not a clean field.

Automatic playlist generation has been the subject of significant academic and commercial development for over two decades. Pandora’s Music Genome Project, Spotify’s audio analysis and recommendation infrastructure, and academic work on harmonic mixing algorithms (most notably the Camelot Wheel system and its derivatives) all represent substantial prior art in the general vicinity of what djOS™ does.

Where the djOS™ claims appear to find differentiation is in the combination of elements and the specific application context. The legal doctrine of obviousness (35 U.S.C. § 103) requires that a claimed invention not be obvious to a person of ordinary skill in the art at the time of filing and while individual components of the djOS™ system may have antecedents in prior art, the argument for non-obviousness will rest on the specific combination: constraint-satisfaction generation, library reconciliation, privacy-preserving real-time telemetry, feasibility-constrained transition filtering, and deviation-weighted learning, all operating in a closed loop tied to a live performance context.

The real-time telemetry pipeline using optical flow analysis and source separation to generate a privacy-preserving crowd engagement signal without individual biometric capture appears to be where the most defensible novelty claim sits. Existing crowd analytics systems in the venue space tend to rely on facial recognition or individual tracking, which creates both regulatory exposure and prior art overlap with biometric surveillance technology. djOS™’s specific approach of working at the aggregate signal level, without individual identification, carves out a distinct technical approach.

International Filing Strategy

The announcement confirms that patent-pending filings have been made in both the United States and international jurisdictions. Without visibility into the specific countries or the PCT application details, it’s worth noting what a thoughtful international strategy looks like for a platform of this kind.

The most commercially significant markets for DJ and live entertainment technology the United States, United Kingdom, Germany, Japan, and Australia each have distinct patent eligibility frameworks for software and AI-related inventions. The European Patent Office, for instance, applies a “technical character” requirement that can be navigated for AI inventions but requires careful claims drafting that emphasizes the technical problem being solved and the technical means by which it is solved. Japan’s patent system has become increasingly receptive to AI-related claims in recent years, following JPO guidelines updated to address machine learning specifically.

A well-constructed international portfolio for djOS™ would likely seek broad independent claims in the U.S. (where patent eligibility for software remains relatively broader than in Europe) while drafting technically specific dependent claims that can anchor European prosecution. The privacy-preserving telemetry architecture and the feasibility-constrained transition repair logic both have the kind of concrete technical specificity that tends to fare well in EPO examination.

Why This Filing Matters Beyond the Product

The AI patent space in 2026 is crowded, contested, and evolving rapidly. But the djOS™ filing is notable precisely because it is not a broad functional patent trying to claim AI-assisted music curation as a category. It is based on what has been disclosed a specific, architecturally grounded patent on a particular technical system for solving a particular set of real-world problems in a particular operational context.

That specificity is both the challenge and the strength of the filing. Narrower claims are harder to design around, but they are also harder to invalidate. For an early-stage company entering a space where well-resourced incumbents could theoretically build competing systems, a defensible narrow patent is often more valuable than a broad claim that invites expensive inter partes review proceedings.

The company is currently in development and is actively engaging platform developers, venue operators, broadcasters, and investment partners. More information is available at djos.ai.